
What is ransomware?
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
970 articles
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
Do you remember where the term “virus” came from? Yes, I’m talking about biological viruses, after which IT security specialists named the computer programs that insert their own code into
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
According to our recent survey, more than 70% of active Internet users have considered quitting their social networks, primarily, they say, because they waste too much time on them. I
Cryptography and ransom have roots deep in human history. However, only in the past few decades has the world seen what can happen when someone combines them. It started in
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
In February 2016, another new strain of ransomware hit the scene, its name akin to what many victims feel when they are hit with ransomware – Crysis. Over the past
Black Friday’s coming, and that means huge rebates and sales. Actually, the hype has already started and the sales have begun. If you have ever tried shopping offline on that
If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do
This article might save you some $300. That’s the average ransom extortionists ask their victims to pay to restore access to victims’ encrypted files or locked computers. It’s quite easy
Usually when we talk about encryptor ransomware, we recommend that victims do not pay the ransom. To begin with, paying encourages malware creators to continue their operations. It’s simple supply
An old-school habit, labelling the back of photos, has transitioned into something more appropriate for the digital age. These days, one needn’t scribble comments on a photo; your camera, an
Even people who avoid online services can find their lives affected by them. For example, one morning you might wake up to find your usually quiet local street has become
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
Last week, our bionic man, Evgeny Chereshnev, headed to Kazan to speak at a TedX event. During his 17-minute talk, he discussed what he has learned from having a biochip
In the beginning, the Internet was not terrifically user friendly — early users needed tech chops just to get online, and they had to do so over a wired, dial-up
Biometric identification — using unique physical attributes such as fingerprints to authenticate people — has been considered secure for a long time. As such, the technology is very appealing to
Kaspersky Lab not only develops security solutions but also helps to catch criminals and creates free decryption tools for ransomware victims. The utilities can be downloaded from the No More
1. Why do I need to read this? This article will help you to protect the money in your bank account. 2. Mobile banking Trojans — what are they? Every